GkSeries.com

Cyber Crime MCQs | Cyber Crime Short Questions and Answers

41 Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
[A] 65
[B] 65-D
[C] 67
[D] 70
Answer: 65
42 What type of attack uses a fraudulent server with a relay address?
[A] NTLM
[B] MITM
[C] NetBIOS
[D] SMB
Answer: MITM

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

43 What port is used to connect to the Active Directory in Windows 2000?
[A] 80
[B] 445
[C] 139
[D] 389
Answer: 389
44 Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
[A] Local networking
[B] Social engineering
[C] Physical entry
[D] Remote networking
Answer: Local networking
45 Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?
[A] Electronic Communications Interception of Oral Communications
[B] 18 U.S.C. § 1029
[C] Cyber Security Enhancement Act 2002
[D] 18 U.S.C. § 1030
Answer: Cyber Security Enhancement Act 2002
46 What is the proper command to perform an Nmap XMAS scan every 15seconds?
[A] nmap -sX -sneaky
[B] nmap -sX -paranoid
[C] nmap -sX -aggressive
[D] nmap -sX -polite
Answer: nmap -sX -sneaky
47 What is the purpose of a Denial of Service attack?
[A] Exploit a weakness in the TCP/IP stack
[B] To execute a Trojan on a system
[C] To overload a system so it is no longer operational
[D] To shutdown services by turning them off
Answer: To overload a system so it is no longer operational
48 What tool can be used to perform SNMP enumeration?
[A] DNSlookup
[B] Whois
[C] Nslookup
[D] IP Network Browser
Answer: IP Network Browser
49 The first phase of hacking an IT system is compromise of which foundation of security?
[A] Availability
[B] Confidentiality
[C] Integrity
[D] None of the Above
Answer: Confidentiality
50 How is IP address spoofing detected?
[A] Installing and configuring a IDS that can read the IP header
[B] Comparing the TTL values of the actual and spoofed addresses
[C] Implementing a firewall to the network
[D] Identify all TCP sessions that are initiated but does not complete successfully
Answer: Comparing the TTL values of the actual and spoofed addresses
51 A packet with no flags set is which type of scan?
[A] TCP
[B] XMAS
[C] IDLE
[D] NULL
Answer: NULL
52 What protocol is the Active Directory database based on?
[A] LDAP
[B] TCP
[C] SQL
[D] HTTP
Answer: LDAP
53 What are the types of scanning?
[A] Port, network, and services
[B] Network, vulnerability, and port
[C] Passive, active, and interactive
[D] Server, client, and network
Answer: Network, vulnerability, and port
54 What is the best statement for taking advantage of a weakness in the security of an IT system?
[A] Threat
[B] Attack
[C] Exploit
[D] Vulnerability
Answer: Exploit
55 Having individuals provide personal information to obtain a free offer provided through the Internet is considered what type of social engineering?
[A] Web-based
[B] Human-based
[C] User-based
[D] Computer-based
Answer: Computer-based
56 Which form of encryption does WPA use?
[A] Shared key
[B] LEAP
[C] TKIP
[D] None of the above
Answer: TKIP

Please share this page

Click Here to Read more questions

Teacher Eligibility Test